Exam 3 Flashcards

1
Q

Address Spoofing

A

changes an originating address or a destination address to redirect the flow of data between two parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AES

A

(Advanced Encryption Standard) is the encryption standard currently used worldwide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Antivirus Program

A

type of utility software that looks for and eliminates viruses, trojans, worms, and other malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Botnet

A

a client-server network created by hackers who gain control over several computers; this network is hidden from the victims, who continue to use their devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Case Tool

A

(computer-aided software engineering tool) is a software application designed for documenting system requirements, diagramming current and proposed information systems, scheduling development tasks, and developing computer programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Common Carrier*

A

entity who provides wired/wireless communication services to general public for a fee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Computer Generations*

A

1G – Vacuum Tubes
2G - transistors and OS
3G – integrated circuits
4G – general purpose micro processors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Computer Virus*

A

is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device. NOT SELF DISTRIBUTING*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computer Worm*

A

3 types
Mass mailing – sends itself out in emails
Internet – Embeds itself in web pages
File sharing – embeds itself in files and internet networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CRT*

A

Cathode Ray Tube, technology that was handily there from television tech for computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cyberwarfare

A

is the use of ICT technology to carry out politically motivated attacks designed to infiltrate, sabotage, or damage an opponent’s information systems and defensive capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Breach

A

is an incident in which personal data is viewed, accessed, or retrieved without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Center

A

is a specialized facility designed to hold and protect computer systems and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Disaster Recovery Plan

A

is a step-by-step description of the methods used to secure data against disaster and a set of guidelines for how an organization will recover lost data and resume operations if and when a disaster occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Disruptive Technology*

A
displaces an existing business process, market, industry, or product
----
Examples: Cellphones, computers
---
Usually positive, can be negative.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Electronic Communications Privacy Act*

A

(ECPA) prohibits unauthorized interception or disclosure of wire and electronic communications or unauthorized access to stored communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Encryption (m)

A

transforms a message or data file in such a way that its contents are hidden from unauthorized readers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Expert Systems

A

Fuzzy logic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Feature Creep

A

one of the steps of failure, when you add too many features and it causes you go to over budget or miss deadlines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Firewall

A
  • is a device or software that is designed to block unauthorized access while allowing authorized communications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Heuristic Analysis

A

how antivirus’s find virus’s without knowing what they look like by watching the program and what it does

22
Q

ICT Core Industries

A

made up of businesses that focus on digital equipment, software, and communications technologies

23
Q

Identity Theft

A

is the fraudulent use of someone’s personal information to carry out transactions, such as applying for loans, making purchases, collecting tax refunds, or obtaining false identity documents

24
Q

Internet Worm

A

looks for vulnerabilities in operating systems, open communication ports, and JavaScripts on Web pages

25
Q

JAD*

A

(Joint application design) puts a user,
programmer, and analyst together to design the
software and reduce failure rate

26
Q

Last Mile*

A

the last mile of cable is the last
sections that are not upgraded to fiber optic,
namely to people’s homes and to some
businesses.

27
Q

LOM*

A

(lights out management) is a data center
type where nobody works there, it is just the
servers. Highly secure.

28
Q

Malware

A

refers to any computer program designed to surreptitiously enter a digital device

29
Q

MIS

A

(management information system)

30
Q

Moore’s Law*

A

every 18-24 months computer

speeds double

31
Q

OLTP*

A

(online transaction processing) a real-time method in which each transaction is processed as it is entered

32
Q

Outsourcing

A

is the use of components or labor from outside suppliers

33
Q

Patriot Act*

A

Federal law passed so that the FBI and CIA should share important info electronically. Also made legal punishment for hackers worse.

34
Q

Pharming*

A

redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, and perpetrate other scams

35
Q

PIECES*

A
PIECES framework helps classify problems in an information system; each letter of PIECES stands for a potential problem
P - Performance
I - Information
E - Economics
C - Control
E - Efficiency
S - Service
36
Q

Project Failure Reasons*

A
  1. Feature/Scope creep – adding too many features – causes the other two
  2. Over budget – too much money
  3. Over time – fails to hit the deadlines
37
Q

Ransomware

A

locks a device and then requests payment for an unlocking code; commonly exploits the Find My iPhone feature

38
Q

Resume*

A

document you submit to companies that gives a basic overview of you.

39
Q

Rootkit Virus*

A

virus that attaches to your C drive, or your root drive. Most dangerous type of virus.

40
Q

SDLC*

A

System development life cycle

Planning > Analysis > Design > Implementation > Maintenance

41
Q

Social Engineering

A

(SE) is a deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest

42
Q

Spyware (m)

A

any software that secretly gathers personal information without the victim’s knowledge

43
Q

STEM

A

STEM (science, engineering, technology, and math)

44
Q

Strong Passwords

A

difficult to hack; conventional wisdom tells us that strong passwords are at least eight characters in length and include one or more uppercase letters, numbers, and symbols

45
Q

System risk*

A

over budget

46
Q

Testing

A

over time

47
Q

Throughput*

A

rate of production or the rate at which something is processed

48
Q

TPS

A

(transaction processing system) provides a way to collect, process, store, display, modify, or cancel transactions

49
Q

Trojan

A

(trojan horse) is a computer program that seems to perform one function while actually doing something else; most trojans are not designed to replicate themselves

50
Q

Whistleblowing

A

is the disclosure by an employee (or professional) of confidential information that relates to some danger, fraud, or other illegal or unethical conduct connected with the workplace